54 |
|
|
55 |
if ( $ip = client::ip_from_mac( $mac ) ) { |
if ( $ip = client::ip_from_mac( $mac ) ) { |
56 |
print "RENEW $mac $ip\n"; |
print "RENEW $mac $ip\n"; |
57 |
|
client::save_ip_mac( $ip, $mac ); |
58 |
return $ip; |
return $ip; |
59 |
} elsif ( in_our_range( $request_ip ) ) { |
} elsif ( ip::in_dhcp_range( $request_ip ) || $request_ip eq '0.0.0.0' ) { |
60 |
$ip = client::next_ip( $mac ); |
$ip = client::next_ip( $mac ); |
61 |
print "NEW $mac $ip\n"; |
print "NEW $mac $ip\n"; |
62 |
} else { |
} else { |
76 |
our $file; |
our $file; |
77 |
our $transaction = 0; # FIXME predictible transaction numbers |
our $transaction = 0; # FIXME predictible transaction numbers |
78 |
|
|
|
sub ip2bin { pack('C*', split(/\./, $_[0])) }; |
|
|
sub in_our_range { |
|
|
my $ip = shift; |
|
|
return 1 if $ip eq '0.0.0.0'; |
|
|
return 1 if ( |
|
|
( ip2bin($ip) & ip2bin($server::netmask) ) |
|
|
eq |
|
|
( ip2bin($server::ip) & ip2bin($server::netmask) ) |
|
|
); |
|
|
} |
|
|
|
|
79 |
sub process_packet { |
sub process_packet { |
80 |
my $sock = shift; |
my $sock = shift; |
81 |
|
|
|
server->refresh; |
|
|
|
|
82 |
my $buf; |
my $buf; |
83 |
$sock->recv($buf, 1024); |
$sock->recv($buf, 1024); |
84 |
my $size = 'empty'; |
my $size = 'empty'; |
138 |
my $options = { |
my $options = { |
139 |
DHO_SUBNET_MASK() => $server::netmask, |
DHO_SUBNET_MASK() => $server::netmask, |
140 |
DHO_ROUTERS() => $server::ip, |
DHO_ROUTERS() => $server::ip, |
141 |
DHO_DOMAIN_NAME() => $server::domain_name, |
DHO_DOMAIN_NAME() => $server::domain, |
142 |
DHO_NAME_SERVERS() => $server::ip, |
DHO_NAME_SERVERS() => $server::ip, |
143 |
DHO_DOMAIN_NAME_SERVERS() => $server::ip, |
DHO_DOMAIN_NAME_SERVERS() => $server::ip, |
144 |
DHO_HOST_NAME() => client::conf( $ip, 'hostname' ), |
DHO_HOST_NAME() => client::conf( $ip, 'hostname' ), |
174 |
|
|
175 |
my $messagetype = $dhcp->getOptionValue(DHO_DHCP_MESSAGE_TYPE()); |
my $messagetype = $dhcp->getOptionValue(DHO_DHCP_MESSAGE_TYPE()); |
176 |
|
|
177 |
|
my @type; |
178 |
|
|
179 |
if ($messagetype eq DHCPDISCOVER()) { |
if ($messagetype eq DHCPDISCOVER()) { |
|
$audit->{type} = 'discover'; |
|
180 |
$packet->{Comment} = $dhcp->comment(); |
$packet->{Comment} = $dhcp->comment(); |
181 |
$packet->{DHO_DHCP_MESSAGE_TYPE()} = DHCPOFFER(); |
$packet->{DHO_DHCP_MESSAGE_TYPE()} = DHCPOFFER(); |
182 |
|
@type = qw( discover offer ); |
183 |
} elsif ($messagetype eq DHCPREQUEST()) { |
} elsif ($messagetype eq DHCPREQUEST()) { |
184 |
my $requested_ip = $dhcp->getOptionValue(DHO_DHCP_REQUESTED_ADDRESS()); |
@type = qw( request ); |
185 |
$audit->{type} = 'request'; |
my $requested_ip = $dhcp->getOptionValue(DHO_DHCP_REQUESTED_ADDRESS()) || $dhcp->ciaddr(); |
186 |
if ( $ip eq $requested_ip ) { |
if ( $ip eq $requested_ip ) { |
187 |
$packet->{DHO_DHCP_MESSAGE_TYPE()} = DHCPACK(); |
$packet->{DHO_DHCP_MESSAGE_TYPE()} = DHCPACK(); |
188 |
$packet->{DHO_DHCP_LEASE_TIME()} = 5 * 60; # 5 min |
$packet->{DHO_DHCP_LEASE_TIME()} = 5 * 60; # 5 min |
189 |
# $packet->{DHO_ROOT_PATH()} = '/exports/foobar'; |
# $packet->{DHO_ROOT_PATH()} = '/exports/foobar'; |
190 |
|
$type[1] = 'ack'; |
191 |
} else { |
} else { |
192 |
$packet->{DHO_DHCP_MESSAGE_TYPE()} = DHCPNAK(); |
$packet->{DHO_DHCP_MESSAGE_TYPE()} = DHCPNAK(); |
193 |
$packet->{DHO_DHCP_MESSAGE()} = "Bad request, expected $ip"; |
$packet->{DHO_DHCP_MESSAGE()} = "Bad request, expected $ip got $requested_ip"; |
194 |
|
$type[1] = 'nak'; |
195 |
} |
} |
196 |
} elsif ($messagetype eq DHCPINFORM()) { |
} elsif ($messagetype eq DHCPINFORM()) { |
197 |
$audit->{type} = 'inform'; |
@type = qw( inform ignored ); |
198 |
} else { |
} else { |
199 |
$audit->{type} = sprintf('ignored %x', $messagetype); |
@type = ( $messagetype, 'ignored' ); |
200 |
} |
} |
201 |
|
|
202 |
warn ">> $mac == $ip server: $server::ip", $file ? " file: $file\n" : "\n" if $debug; |
warn "# type ",dump @type; |
203 |
|
$audit->{type} = [ @type ]; |
204 |
|
|
205 |
$audit->{response} = $packet; |
$audit->{response} = $packet; |
206 |
|
|
207 |
$packet = new Net::DHCP::Packet( %$packet ); |
$packet = new Net::DHCP::Packet( %$packet ); |
208 |
warn "send ",$packet->toString() if $debug; |
warn "send ",$packet->toString() if $debug; |
209 |
|
|
210 |
if ( in_our_range( $ip ) ) { |
if ( ip::in_dhcp_range( $ip ) ) { |
211 |
my $buff = $packet->serialize(); |
my $buff = $packet->serialize(); |
212 |
|
|
213 |
my $reply = IO::Socket::INET->new( |
my $reply = IO::Socket::INET->new( |
215 |
LocalPort => 67, |
LocalPort => 67, |
216 |
Proto => "udp", |
Proto => "udp", |
217 |
Broadcast => 1, |
Broadcast => 1, |
218 |
PeerAddr => '255.255.255.255', |
# PeerAddr => '255.255.255.255', |
219 |
|
PeerAddr => $server::bcast, |
220 |
PeerPort => 68, |
PeerPort => 68, |
221 |
Reuse => 1, |
Reuse => 1, |
222 |
) or die "socket: $@"; |
) or die "socket: $@"; |
223 |
|
|
224 |
$reply->send( $buff, 0 ) or die "Error sending: $!\n"; |
$reply->send( $buff, 0 ) or die "Error sending: $!\n"; |
225 |
|
warn ">> $mac == $ip server: $server::ip", $file ? " file: $file\n" : "\n"; |
226 |
} else { |
} else { |
227 |
$audit->{error} = "$ip our of our range $server::ip $server::netmask"; |
$audit->{error} = "$ip our of our range $server::ip $server::netmask"; |
228 |
|
warn $audit->{error}; |
229 |
} |
} |
230 |
|
|
231 |
CouchDB::audit( $audit->{type}, $audit ); |
CouchDB::audit( @type, $audit ); |
232 |
|
|
233 |
# system("arp -s $ip $mac"), |
# system("arp -s $ip $mac"), |
234 |
|
|
253 |
CouchDB::audit( 'start', { addr => $sock->sockhost, port => $sock->sockport } ); |
CouchDB::audit( 'start', { addr => $sock->sockhost, port => $sock->sockport } ); |
254 |
|
|
255 |
while (1) { |
while (1) { |
256 |
|
server->refresh; |
257 |
process_packet $sock; |
process_packet $sock; |
258 |
} |
} |
259 |
} |
} |